FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Reverse Engineering topics
Reverse Engineering
Autonomous System
Medical Device
Integrated Circuit
System Resource
Computer System
Decryption
Executable
Semiconductor
Semiconductor Device
Cryptography
Encryption
Microprocessor
Microprocessors
Instruction Set Architecture

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Reverse Engineering patents



      
           
This page is updated frequently with new Reverse Engineering-related patent applications. Subscribe to the Reverse Engineering RSS feed to automatically get the update: related Reverse RSS feeds. RSS updates for this page: Reverse Engineering RSS RSS


Semiconductor device having features to prevent reverse engineering

Date/App# patent app List of recent Reverse Engineering-related patents
07/17/14
20140201852
 Systems and methods for detecting and mitigating programmable logic device tampering patent thumbnailnew patent Systems and methods for detecting and mitigating programmable logic device tampering
Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as fpgas, have two stages of operation; a configuration stage and a user mode stage.
07/17/14
20140200163
 Multiplexed genetic reporter assays and compositions patent thumbnailnew patent Multiplexed genetic reporter assays and compositions
The invention provides methods for determining the activity of a plurality of nucleic acid regulatory elements. These methods may facilitate, e.g., the systematic reverse engineering, and optimization of mammalian cis-regulatory elements at high resolution and at a large scale.
07/17/14
20140198554
 Semiconductor device having features to prevent reverse engineering patent thumbnailnew patent Semiconductor device having features to prevent reverse engineering
A rom circuit includes a first n channel transistor having an output and having device geometry and device characteristics adapted to bias the output at a predetermined level when a p channel circuit is connected to the first n channel transistor; a pass transistor connected between the output and a data bus, the pass transistor connected to a word line, the word line adapted to turn on the pass transistor when the word line is asserted; and the p channel circuit connected to the data bus and adapted to provide leakage current to charge a gate in the first n channel transistor when pass transistor is turned on.. .
03/27/14
20140089202
 Crm security core patent thumbnailCrm security core
A security core supports a networked banking app for a client application device communicating with a server, such as e.g. A smartphone.
01/23/14
20140025358
 Systems and methods for modeling and analyzing networks patent thumbnailSystems and methods for modeling and analyzing networks
The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks.
12/05/13
20130320491
 Semiconductor device having features to prevent reverse engineering patent thumbnailSemiconductor device having features to prevent reverse engineering
It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques.
11/21/13
20130311159
 Systems and methods for reverse engineering models of biological networks patent thumbnailSystems and methods for reverse engineering models of biological networks
The present invention provides methods and accompanying computer-based systems and computer-executable code stored on a computer-readable medium for constructing a model of a biological network. The invention further provides methods for performing sensitivity analysis on a biological network and for identifying major regulators of species in the network and of the network as a whole.
11/14/13
20130300454
 Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing patent thumbnailMethod and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing
A method and apparatus for camouflaging an application specific integrated circuit (asic), wherein the asic comprises a plurality of interconnected functional logic is disclosed. The method adds functionally inert elements to the logical description or provides alternative definitions of standard logical cells to make it difficult for reverse engineering programs to be used to discover the circuit's function.
10/31/13
20130291116
 Method for external storage of medical device program design parameters patent thumbnailMethod for external storage of medical device program design parameters
Many electronic medical devices include program design features that direct the operation of the device. The program design features of most electronic medical devices reside in the device itself and therefore are easily discovered by reverse engineering.
09/19/13
20130242801
 Reverse engineering peering at internet exchange points patent thumbnailReverse engineering peering at internet exchange points
A technique for examining the relationships of autonomous systems (ases) participating in an internet exchange point (ixp) utilizes packet tracing servers proximate the ixps. Where such packet tracing servers cannot be found in the participating ases, the methodology identifies additional vantage points by looking at a list of ases that are one hop away from the ases at the ixp.
07/25/13
20130191803
Method and apparatus for camouflaging a standard cell based integrated circuit
A method and apparatus for camouflaging an application specific integrated circuit (asic), wherein the asic comprises a plurality of interconnected functional logic is disclosed. The method adds functionally inert elements to the logical description or provides alternative definitions of standard logic cells to make it difficult for reverse engineering programs to be used to discover the circuit's function..
07/11/13
20130179967
Method to deter softwear tampering using interlinked sub-processes
A method is disclosed for deterring the reverse engineering of computer software code. The method involves the recognition of an unauthorized access attempt by one of a plurality of linked sub-processes embedded in the computer software code.
06/20/13
20130154687
Semiconductor device having features to prevent reverse engineering
It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques.
06/13/13
20130151865
Securing microprocessors against information leakage and physical tampering
A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis..
05/16/13
20130125243
Method for preventing software reverse engineering, unauthorized modification, and runtime data interception
A method for preventing the unauthorized modification of a software or unauthorized modification of runtime data. According to this method, a converter, which is capable of converting the software into a generalized machine code is provided.
04/11/13
20130091571
Systems and methods of processing data associated with detection and/or handling of malware
The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed.
03/14/13
20130063731
Non-contact scanning system
A non-contact scanning system for three dimensional non-contact scanning of a work piece is disclosed for use in various applications including reverse engineering, metrology, dimensional verification and inspection the scanning system includes a scanner carried by an arcuately configured gantry assembly and a fixture for carrying a work piece. The gantry assembly includes a fixed arcuately shaped gantry member and a telescopic arm that is movable in an arcuate direction relative to a rotary table that carries the object to be scanned.
03/07/13
20130061061
Protecting look up tables by mixing code and operations
In the field of computer enabled cryptography, such as a cipher using lookup tables, the cipher is hardened against an attack by a protection process which obscures the lookup tables using the properties of bijective functions and applying masks to the tables' input and output values, for encryption or decryption. This is especially advantageous in a “white box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution.
03/07/13
20130060543
Systems and methods for reverse engineering models of biological networks
The present invention provides methods and accompanying computer-based systems and computer-executable code stored on a computer-readable medium for constructing a model of a biological network. The invention further provides methods for performing sensitivity analysis on a biological network and for identifying major regulators of species in the network and of the network as a whole.
02/28/13
20130052822
Techniques for impeding reverse engineering
Anti-reverse engineering techniques are provided. In one aspect, a method for forming at least one feature in an insulating layer is provided.
02/28/13
20130047714
Insert assembly and method for fluid flow reverse engineering
A fluid testing apparatus for performing fluid flow analysis on a gas turbine engine component having a plurality of fluid cooling circuits each defining one or more openings in the component includes a first sealing insert configured to create a seal at an interface of the first sealing insert to the component to seal off one or more openings of a first fluid cooling circuit of the component and a generic insert separable from the first sealing insert. The first sealing insert is configured as a substantially flat sheet having a shaped perimeter, and the component is clampable to the generic insert to hold the first sealing insert against the component..
01/17/13
20130016836
Cryptographic process execution protecting an input value against attacks
A cryptographic process (such as the aes cipher) which uses table look up operations (tlus) is hardened against reverse engineering attacks intended to recover the table contents and thereby the cipher key. This hardening involves removing any one-to-one correspondence between the tlu inputs and outputs, by altering the output of the tlu dynamically, e.g.
01/10/13
20130014267
Computer protocol generation and obfuscation
In the field of computer science, communications protocols (such as computer network protocols) are hardened (secured) against reverse engineering attacks by hackers using a software tool which is applied to a high level definition of the protocol. The tool converts the definition to executable form, such as computer source code, and also applies reverse-engineering countermeasures to the protocol definition as now expressed in source code, to prevent hackers from recovering useful details of the protocol.
01/10/13
20130010963
Multiplicative splits to protect cipher keys
In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the round keys using the properties of group field automorphisms and applying masks to the states of the cipher, for encryption or decryption. This is especially advantageous in a “white box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution.


Popular terms: [SEARCH]

Reverse Engineering topics: Reverse Engineering, Autonomous System, Medical Device, Integrated Circuit, System Resource, Computer System, Decryption, Executable, Semiconductor, Semiconductor Device, Cryptography, Encryption, Microprocessor, Microprocessors, Instruction Set Architecture

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Reverse Engineering for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Reverse Engineering with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



1.5907

1317

449491 - 0 - 24